Search

Your search keyword '"unconditional security"' showing total 376 results

Search Constraints

Start Over You searched for: Descriptor "unconditional security" Remove constraint Descriptor: "unconditional security"
376 results on '"unconditional security"'

Search Results

1. Kirchhoff meets Johnson: In pursuit of unconditionally secure communication.

2. Designing a Robust Quantum Signature Protocol Based on Quantum Key Distribution for E-Voting Applications.

3. Smart Grids Secured by Dynamic Watermarking: How Secure?

4. Kirchhoff meets Johnson: In pursuit of unconditionally secure communication

5. Quantum Bit Commitment Without Quantum Memory.

6. Semi-quantum key distribution using qudit systems and security proof.

7. Designing a Robust Quantum Signature Protocol Based on Quantum Key Distribution for E-Voting Applications

10. Security analysis for single-state circular mediated semi-quantum key distribution.

11. Revisiting the Efficiency of Asynchronous MPC with Optimal Resilience Against General Adversaries.

12. Tag Generation Using Chaotic Sequences for Physical-Layer Authentication

13. Unconditionally Secure NIZK in the Fine-Grained Setting

14. Quantum anonymous one-vote veto protocol based on BB84 states

15. Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using OTP With a Single Pre-Shared Key.

16. : Efficient Comparison for Secure Multi-Party Computation

17. Security Analysis of a Multi-secret Sharing Scheme with Unconditional Security

18. Time Synchronization Protocol for the KLJN Secure Key Exchange Scheme.

19. Mutual authentication quantum key agreement protocol based on Bell states.

20. 基于BB84 态的量子匿名一票否决协议.

21. Statistical Random Number Generator Attack Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol.

22. 基于连续变量量子通信的地铁 量子调度网络研究.

23. Two-party Mutual Authentication Quantum Key Agreement Protocol.

24. Nonlinearity Attack Against the Kirchhoff–Law–Johnson-Noise (KLJN) Secure Key Exchange Protocol.

25. Introduction

26. Deep Random Based Key Exchange Protocol Resisting Unlimited MITM

27. Simulations for Deep Random Secrecy Protocol

28. A Fair and Efficient Secret Sharing Scheme Based on Cloud Assisting

29. Multiplicative Linear Secret Sharing Without Interaction

31. Information-Theoretically Secure String Commitments Based on Packet Reordering Channels

32. Alternating (AC) Loop Current Attacks Against the KLJN Secure Key Exchange Scheme.

33. Deterministic Random Number Generator Attack Against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol.

34. Generalized DC loop current attack against the KLJN secure key exchange scheme

35. Flexible for Multiple Equations about GHZ States and a Prototype Case.

36. Unconditionally secure relativistic multi-party biased coin flipping and die rolling.

37. Quantum blockchain system.

38. Man in the Middle and Current Injection Attacks Against the KLJN Key Exchanger Compromised by DC Sources.

39. Quantum Key Distribution Networks: Challenges and Future Research Issues in Security.

40. Comments on the "Generalized" KJLN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security.

41. An Improved Quantum E-Payment System.

43. Unconditionally Secure Computation with Reduced Interaction

44. Secret Sharing for mNP: Completeness Results

45. Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness

46. Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols

47. Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols

48. Quantum Key Distribution Networks: Challenges and Future Research Issues in Security

49. Feasibility and Infeasibility of Secure Computation with Malicious PUFs

50. From New Technologies to New Solutions : Exploiting FRAM Memories to Enhance Physical Security

Catalog

Books, media, physical & digital resources